Learn from the Tenchi Team!
Insights and news
Filters
October 7, 2024
How third-party risk management enhances your approach to systemic risks
No items found.
August 13, 2024
Why sharing third-party cybersecurity evaluations with other companies might not work for your business
No items found.
June 12, 2024
Data breaches beyond numbers: a third-party cyber risk management perspective
News
Research
Supply Chain Security
May 30, 2024
The new partnership between Tenchi and ABBC boosts cybersecurity for the brazilian banking ecosystem
No items found.
April 4, 2024
Fixing AWS Step Function errors due to reference to inactive AWS Batch Job Definition revisions
No items found.
February 1, 2024
Tenchi Security raises a $7 million Series A from Bradesco, L4 Venture Builder, and Accenture
No items found.
May 26, 2023
Treating errors in AWS Step Functions
No items found.
April 13, 2023
Manipulating roles and permissions in Microsoft 365 environment via MS Graph
No items found.
July 11, 2022
RSAC 2022: Experts Call for Major Changes to Third Party Risk Management
No items found.
June 3, 2022
Keeping your Oracle Cloud Infrastructure Secure (Part 1): Compute Instances
No items found.
November 18, 2021
Tenchi Security brings in Google and Apple alum to lead product development
No items found.
October 19, 2021
Tenchi Security raises a US$3.3MM seed round to improve transparency and security in the cloud
No items found.
November 2, 2020
AWS Managed IAM Policies
No items found.
October 21, 2020
Detecting abuse in the AWS control plane in an actionable wayusing Det{R}ails
No items found.
June 18, 2020
A Simple Unauthenticated Technique to Determine if an AWS IAM or root User has MFA Enabled
No items found.
February 18, 2020
using-amazon-aws-inspector
No items found.
November 14, 2019
AWS Two Factor Authentication – what are the differences between SSO and IAM?
No items found.
October 14, 2019
Tenchi Security acquires BlueOps
No items found.
No results found.
There are no results with this criteria. Try changing your search.